RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Symantec DLP - Data Loss Prevention

Product
Developers: Symantec
Last Release Date: April, 2013
Technology: Cybersecurity - Information loss preventions

Content

Symantec of DLP uses technology of the analysis of contents of new generation. Violations of established policies are processed by the automated control system for incidents with functions of role access for staff of IT department. The technology of removal Digital Fingerprints is applicable to any types to documents, including text, audio and video documents, to drawings and also for databases (SQL, Oracle, etc.), separate tables or their parts. Along with the innovative technology of removal of "digital fingerprints", Symantec also supports traditional methods: recognition and tracking on a key word, dictionaries, regular expressions. In addition to means of prevention of leaks at the level of network in an arsenal of Symantec of DLP there is also an agent for workstations – Symantec DLP Endpoint. With its help prevention of leaks on removable media of information (USB, CD/DVD and so forth), check of contents when printing (with a possibility of blocking) and also tracking a clipboard is provided (Copy/Paste function).

Packet of localization of Russian Language Pack for Symantec DLP 10.5. will be free both for existing, and for future customers of Symantec of DLP. Loading of a packet of localization is available to all current users from the website http://fileconnect.symantec.com/ by the product serial number.

2011

Symantec Data Loss Prevention 11

The new version of the solution will include the self-trained analysis algorithm of data of Vector Machine Learning (VML). VML – first and the technology of the analysis and data loss prevention, only in the market, based on the principles of artificial intelligence and capable to independently identify data, access to which should be limited. Besides, Symantec Data Loss Prevention 11 increases efficiency of process of response to incidents by means of advanced Data Insight technology and also provides additional security measures on endpoints.

It is more than data – more risks

The volume of unstructured data grows more than for 60% a year. As a result, management of them constantly becomes complicated, and it becomes more difficult to provide their protection. The most valuable information of the enterprises – their intellectual property – is often lost in the growing volume of unstructured documents, the majority of which are not confidential. Storages of unstructured data are usually more weakly protected that does them more vulnerable for internal and external threats. As showed results of the target attacks, such as Hydraq and other widely known cases of loss of internal data, intellectual property items are more vulnerable now, than ever earlier.

Vector Machine Learning will independently detect the data requiring protection against leaks

The organization should identify confidential documents before taking steps for their protection. Data loss prevention traditionally was based on two categories of technology of data definition: method of "digital fingerprints" and description of information. The method of "digital fingerprints" assumes collecting of all documents which are subject to protection and applications to each file of a unique indektifikator - "digital fingerprint". Alternative approach (the description of data) assumes determination of standard expressions and the list of a key word for identification of critical documents. The method of "digital fingerprints" can present considerable difficulties for the organizations with widely dispersed data, and development of the rules describing data can be very labor-intensive process which results can be less exact, than when using a method of "digital fingerprints".

Vector Machine Learning is the innovative technology of the analysis developed by Symantec. It is designed to overcome restrictions of the existing technologies of identification of documents. Using samples of the used data, the software solution based on algorithms Vector Machine Learning it is possible to teach to learn key characteristics and to define internal distinctions of confidential and not confidential data. Such approach eliminates need of creation of the rules based on a key word and also the need for application of "digital fingerprints" to new documents during their creation. The principle of work of Vector Machine Learning technology allows to create precise rules of identification of documents on the basis of the analysis of examples of documents, and further, to improve the accuracy of rules in process of identification and processing by the system of positive and negative examples of documents.

Data Insight simplifies data protection process

The solution Symantec Data Loss Prevention 11 includes advanced Symantec Data Insight technology which improves process of response to incidents by determination of the most weak spots of data storage and the automatic notification on it of users. The new feature of ranging of risks of Risk Scoring will create the rating of folders for recovery taking into account volumes and the level of criticality of the data which are contained in folders and also parameters of availability of the folder. The new feature of data recovery of Data Owner Remediation will automatically warn users by e-mail about potential risks to which their data which are stored in the general data processing centers are exposed. Such complex of actions will increase efficiency of data protection of the organizations.

Protection of "endpoints" became even more reliable

Symantec Data Loss Prevention 11 will provide additional opportunities for work in endpoints, including new features which will allow the organizations to permit users work with a large number of applications and devices for data storage, at the same time supporting the high level of protection. Function of access control to the Application File Access Control applications is intended to provide support of such user programs as iTunes, Skype and WebEx without putting at risk confidential data. The Trusted Devices function will provide support of use of a broad spectrum of storage devices and will limit a possibility of copying of confidential data. It is possible to permit copying only on the authorized carriers (for example, the carriers issued and controlled by the company). One more new feature in this version of the solution – Endpoint FlexResponse, it simplifies data protection of endpoints by integration into other solutions of Symantec and also solutions of third-party producers, for example, for data encryption and management programs for the rights of the enterprises (Enterprise Rights Management, ERM).

2013

Symantec Data Loss Prevention 11.5

The version of the product Symantec Data Loss Prevention 11.5, the complete solution for search, tracking and confidential data protection taking into account their contents, has a number of key advantages and allows, in particular:

  • interfere with uncontrollable distribution of confidential data out of limits of the enterprise through network, network storages and computers of workers;
  • reveal the broken business processes leading to leakage of confidential data;
  • perform monitoring and protection of transfer of important information on public websites;
  • define and unroll universal politicians of the all-corporate level of security.

2015

Technologies of ABBYY are applied in the DLP solution of Symantec for recognition of information on images

OCR technologies of ABBYY are used in the DLP solution of Symantec company for recognition and blocking of confidential data transmission on images. The solution Symantec Data Loss Prevention allows to minimize information leak probability at the expense of the operational analysis of its movement, at the same time advanced technologies of data analysis are used.

At the information leak critical for the organization, the probability of financial losses or decrease in trust to the company from her clients and partners is high. The companies select different processes of creation, storage and data processing therefore often information is stored and transferred not only in text, but also in a graphic format. For example, important documents can be in the form of scanned copies of paper documents or screenshots.

The solution of Symantec of DLP by means of OCR technologies of ABBYY opens new opportunities for confidential information protection for the companies using EDMS or practicing the translation of paper documentation in electronic copies. Technologies of ABBYY help to process flows of graphic data, without depriving the solution of Symantec of DLP of an opportunity to instantly block information transfer. At the same time all processing remains imperceptible for the user and does not cause time delays.

"When choosing the supplier of technologies of optical recognition of texts we were guided by such criteria as reliable reputation of the producer, the innovation ideas and technologies, high quality of implementation of solutions, and, of course, obligatory support of Russian. ABBYY and its technologies meet all our requirements, and we are glad that the DLP solution of Symantec became even more perfect using OCR technologies of the company", – Alexander Kliyentov, the technical adviser on information security, Symantec comments.

The linking of ABBYY and Symantec of DLP differs in significant architectural and technology superiority and also scalability for processing of any volumes of the data transferred out of limits of the company or stored in internal systems from existing solutions.