Data Loss Prevention (DLP)
Prevent leakage of sensitive data with minimal effort to value
Protect sensitive data with the ease and speed you need
For years, organizations have had little success protecting sensitive data from unauthorized access and exfiltration via external attacks or insider risks such as IT misconfigurations, human error or threats. This has left them exposed to consequences like embarrassing headlines, damaged customer and partner trust, equity losses, HR problems and regulatory sanctions.
Unfortunately, the key DLP adoption obstacles of complexity, deployment costs, and a long time to value due to DLP policies being not-universal but highly business-specific, have remained insurmountable for most companies other than the very largest enterprises.
Acronis Advanced DLP empowers you with unmatched provisioning, configuration, and management simplicity, to prevent data leakage from client workloads and strengthen regulatory compliance.
A unique behavior-based technology automatically creates and continuously maintains business-specific policies, without requiring months to deploy, teams to maintain or a Ph.D. in privacy law to understand.
CLIENT-SPECIFIC DLP POLICIES
Monitor outgoing sensitive data flows across the organization to automatically map client’s business processes to a DLP policy adjusted to their specifics. Leverage optional end-user
assistance for higher accuracy and request client validation before enforcing a policy.
UNMATCHED ARRAY OF CONTROLLED CHANNELS
Control data flows across local and network channels, including removable storage, printers,
redirected mapped drives and clipboard, emails and webmails, instant messengers, file sharing services, social networks, and network protocols.
COMPREHENSIVE DLP CONTROLS
Ensure web-browser independent control of data transfers to social media, webmail and file sharing services. Leverage content inspection of outgoing instant message and sensitive data detection in images on remote and offline computers
Observation mode
Effortlessly provision DLP services, removing thecomplexity of initial policy creation. In the observationmode, the agent monitors clients’ endpoint computersfor outgoing, sensitive data flows to generate the baselineDLP policy automatically or, optionally, with end-userjustification of the most risky data transfers.
Enforcement mode
Once the DLP policy is validated with clients, you can
enforce it to start protecting their data. Enforcement mode
enables you to select how to enforce DLP policies:
Strict enforcement
Enforces the DLP policy as defined, without extending it with new data flow rules. Any data transfer that doesn’t match a defined data flow rule in the policy is blocked unless the end user requests a one-time business-related exception for enabling a block override.
Adaptive enforcement
Enforces the DLP policy but offers flexibility extending it with new rules for allowing previously unobserved business-related data flows