ANTI DATA LEAKAGE

Share to :

ANTI DATA LEAKAGE ENABLES EMPLOYEES, CONTRACTORS AND BUSINESS PARTNERS, TO SECURELY USE CORPORATE DATA TAKEN
FROM ANY APPLICATION ON ANY ZERO TRUST DEVICE.

Over View

Benefits

Reduces organisation liability
Addresses the liability that is created by data stored outside of your trusted applications

Aid in the leverage of gig-economy
Work securely and productively with users outside of your organisation

Address the insider threats
Assist in addressing the issue of data hoarding and carelessness of employees

Complements your existing system
Ability to complement other present InfoSec Systems, such as DLP

Comparison


Between ADL and RMS & DLP

ANTI-DATA LEAKAGE RMS DLP
APPROACH
  • User retrieves any data
  • Anti-Data Leakage then transparently tracks and protects the data
  • User continues to work as usual

  • Publishers must set file protection rules
  • Data user actions limited to pre-defined rules
  • Organizations must pre-define permissible workflows
  • Users may only work within these workflows
SECURITY FOCUS
Any transient phase between protected repositories
Sensitive assets that require distribution beyond the organization
Organizational workflows between predefined sources and targets
ADDRESSING LIABILITY
(due to corporate data at the EP)
Directly measures and remediates liability
Cannot measure the liability - only published files can protect their content
Can measure the liability at the endpoint and can be integrated with other solutions to provide remediation
EMPLOYEE FLEXIBILITY
High - any source, any use and any users, including 3rd parties
Low - restricted to the published files and their pre-defined limitations (hinder collaboration)
Low - restricted to the workflows allowed by the DLP endpoint
COMPLEXITY
Simple deployment and automated source configuration
Simple deployment, however requires complex policy maintenance by the publisher
Complex GRC process to measure and define the predefined workflows
EXTERNAL SOURCES & MIXED-USE
Supports both external sources of data (e.g. govt sites) as well as mixed use devices
External sources not supported (cannot wrap the download in RMS). Supports mixed use.
Does not support mixed-use scenarios
REMEDIATION PERSISTENCY
Yes, files are encrypted at all times
Yes, files are encrypted at all times
Depends on the DLP configuration and its integration

How it works


Roaming laptops and BYOD present two new challenges: mixed-use (endpoints host a mix of corporate data with private employee data and/or data that belongs to another employer) and the need for network independecy. Anti Data Leakage addresses these needs by:

Key Features


Anti Data Leakage has the features CISO’s demand:

Separation of Corporate Data from Private and other employer data

Many endpoints are mixed-use and hence have a mix of corporate data and other data (such as employee private data and other employer data). Unlike DLP, tracks corporate data separately – from its source (cloud, intranet or application) and throughout its lifecycle, ensuring data is protected but also that employee privacy is maintained.

Transparent Encryption

AES256 encryption secures the data while it is stored on the endpoint. Full tracking can be used to demonstrate compliance with various regulation, and provide for safe harbor in case the laptop is lost or stolen.

Compliance Ready Reporting

Protecting data is important – but so is being able to show how data is being tracked and protected to regulators and auditors. Anti Data Leakage shows the which laptops have sensitive data, ranked by risk, and how is that data being used.

antiHACK-Logo