Hello everyone,
How would you like to audit your endpoints against sensitive and confidential information? Introducing the new data loss prevention discovery scanning that lets you define your own sensitive data and scan your endpoints against company policies. Discovery scans lets you search for and log the existence of sensitive data types, patterns and keywords.
You may even isolate these sensitive files and minimize the risk of data loss and ex-filtration by using the new “Quarantine” action on DLP discovery scans. With the new quarantine action, all files with sensitive information will automatically be removed from your endpoints while you retain a copy of the original file for further investigation.
To minimize the time to get started, now you can also import keyword groups from text files. Do you want to audit your endpoints against your customer’ mobile phone numbers quickly? All you need to do is to import the sensitive information to a keyword group and start a discovery scan on your endpoints.
And that’s not even all. How would you like to minimize the risk of data ex-filtration by turning all your USB flash disks to read-only? The new DLP Monitoring capability lets you block your users from copying and moving files to USB flash disks while letting them retain access to the data already available inside the disks to minimize any downtime to productivity. For those who are interested in completely blocking such devices, let us remind you that CCS already has the ability to entirely block any device type through the device control feature.
Best Regards,
Product Management Team