Menu

eScan Enterprise DLP

Data Leak Prevention is a method for preventing the loss, theft, or unintentional leak of sensitive data. In order to prevent unwanted access to data, it often entails adopting organizational and technical controls. It might also include precautions for data loss detection and reaction.

Data Leak Prevention, often known as DLP, is an essential business process that makes sure sensitive and mission-critical data doesn't leave the company.

The crucial information of the business will be shielded from unauthorized access by the eScan Enterprise Data Leak Prevention. Its primary objective as a data security solution is to stop end users from sending sensitive or important data outside the organization's network utilizing a variety of techniques, tools, and methods. It monitors, detects, and blocks sensitive data while In Use, In Motion by monitoring, identifying, and preventing potential data breaches and data exfiltration attempts.

To experience the benefits of this product, why not give it a try and consider making it yours?
Write to us sales@escanav.com


Key Features

File Attachment Block

File Attachment Block

eScan-DLP Attachment block feature lets you control attachment flow within your organization. You can block/allow all attachments that a user tries to send through specific pre-defined processes. You can exclude specific domains/sub-domains that you trust, from being blocked even if they are sent through the blocked processes mentioned above.

Content-Aware Controls

Content-Aware Controls

This superlative feature enables the administrator to monitor & control the type of information which can be sent outside of the endpoint. Sensitive/Confidential Information, also termed as PII, which many a time are controlled by government regulations (GDPR, for instance) can be broadly categorized.

Workspace Application Control

Workspace Application

Make sure user can login only corporate profile not able to login personal profile. For Eg ..Application or domain like gmail.com, O365, One drive etc..

Printer Access Control

Printer Access Control

eScan-DLP manages the printing activity of sensitive documents. Printer Access Control options can define which data can be printed on specific printers and by whom. One advantage of this technical solution is that in the event of unauthorized activity, the DLP system logs the incident, notifies the user about the risks, and can also block the print.

Wi-Fi Access Control

Wi-Fi Access Control

Wi-Fi Access Points come with a default SSID and password that must be updated, although default passwords are frequently kept in place. This makes it simple for an attacker to log in and take control of the router, configure settings or firmware, load malicious programs, or even change the DNS server to send all traffic to an attacker's IP address.

File Activity Monitoring (Local/Network/Storage Devices)

File Activity Monitoring (Local/Network/Storage Devices)

The File Activity module displays a report of the files created, copied, modified, and deleted on managed computers. Additionally, in case of misuse of any official files, the same can be tracked down to the user through the details captured in the report. The Administrator can select and filter the report based on any of the details captured.

Session Activity

Session Activity

This submodule monitors and logs session activities of managed computers. It displays a report of the Operation type, Date, Computer name, Group, IP address and event description. With this report, the administrator can trace the user Logon and Logoff activity, along with remote sessions that took place on all managed computers.

Application Access Report

Application Access Report

The Application Access Report module gives a detailed view of all the applications accessed by the endpoints which are part of Managed Computers. The log displays a list of applications executed and the time duration for which the app was active. Options for Filtering or Exporting the log in desired formats are also present on the same interface. You will get the details of the computer name which accessed the app and the duration.

Disable Print Screen

Disable Print Screen

This will block any screen-shot and/or screen-grab process, like the windows snipping tool, from capturing desktop screen images. This feature will ensure that users cannot capture sensitive information as an image and transfer it outside. Hence it is an important aspect of DLP.

Sensitive File Protection

Sensitive File Protection

This feature will ensure that sensitive data cannot be accessed using any other application except the default application specified. Once a folder is classified as "Sensitive", its contents cannot be changed / deleted in any way. The files can be accessed using only the associated apps and any kind of editing is blocked to avoid data modification.

Screen Capture

Screen Capture

Screen Capturing makes it easier to take desktop screen-shots. As a business owner, it becomes crucial to be aware of the activities of employees, especially in the case of customer service or help-desk teams. Employees may work hard but to clearly understand their productivity, screen capturing gives you a detailed insight into the work being done.

LOAD MORE FEATURES

Benefits

  • Reduces the risk of a data breach
  • Protects against insider threat
  • Prevents data theft
  • Preventing unauthorized users from accessing your data
  • Providing you with better visibility and control over your data
  • Improving compliance and avoiding compliance violations
  • Helping your IT security specialists to automate their work

 

Will Your System Support This Software? You can find it here…

Operating Systems:

For Windows (Windows server & workstations) Platforms Supported

  • Microsoft® Windows® 2022 / 2019 / 2016 / 2012 / SBS 2011 / Essential / 2008 R2 / 2008 / 2003 R2 / 2003 / 11 / 10 / 8.1 / 8 / 7 / Vista / XP SP 2 / (For 32-Bit and 64-Bit Editions)

For Server

  • CPU: 2.0 GHz Intel™ Core™ Duo processor or equivalent
  • Memory: 4 GB & above
  • Disk Space: 8 GB & above

For Endpoints (Windows)

  • CPU - 1.4 Ghz minimum (2.0 Ghz recommended) Intel Pentium or equivalent
  • Memory - 1.0 GB and above
  • Disk Space (Free) – 1 GB and above

eScan Console can be accessed by using below browsers:

  • Internet Explorer 11 and above
  • Firefox latest version
  • Google Chrome latest version
Live Chat
Top