Secure data everywhere it goes, especially on mobile devices—from laptops and USB drives to smartphones and tablets. Chariot Infotech data protection solutions make it easier to identify, track, and secure sensitive company, customer, and employee data from the endpoint to the cloud



From tarnished brand reputation to regulatory fines, the adverse impacts of data breaches are clear. Just a single incident of data loss can erode a business's competitive advantage, weaken consumer confidence, and result in fines or penalties from regulators. The problem is further exacerbated with rapid proliferation of mobile computing devices, widespread use of peripheral devices, and easy access to file-sharing software — all increasing the opportunity for data loss and theft.

Data loss or leakage has become a major issue in today’s world. Simply type “Data Loss Incidents” into any search engine and you will find loads of lists recording all the incidents over recent years. At the same time, these often involve physical loss of laptops, CDs or memory sticks, they also include data lost or leaked through poorly secured infrastructure. Common contributors to the reasons for these leaks include lack of user awareness, users being non-compliant with policy and absence of an appropriate policy.

Many companies even consider data security to be a strategic issue. Here, the responsibility lies with management. This is also true for handling of confidential data and making sure that it can't be abused. But, in reality, unclear data structures, incomprehensible access rights, insufficient user awareness and the lack of risk/cost assessments require that data leakage be prevented. This, in turn, is permanently anchored in a professional and proactive manner in a company's security-related processes as an integral part of risk management.

Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside of the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

Chariot Infotech program for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. Chariot Infotech DLP is delivered through low-maintenance appliances (physical or virtual).

Benefits
Easy DLP deployment and simplified management
  • Centralized management of security policy via a single console
  • Pre-configured policies allow for immediate data loss prevention
  • Broadest support for file formats and data types
Pre-emptive data loss prevention for critical business information
  • Our technology allows for real-time user remediation
  • It combines users, content and process for unrivaled accuracy
  • Educates and alerts users without involving IT/security personnel
  • Inspect and control sensitive emails both leaving the organization and between departments
Features
UserCheck

Chariot Infotech UserCheck empowers users to remediate incidents in real time. This innovative technology alerts users of suspected breaches for instant remediation and allows quick authorization of legitimate communications.

UserCheck improves security and raises awareness of data use policies by empowering users to self-administer incident handling-with options to send, discard or review the issue. Notifications occur in real-time via a pop-up from a thin agent or via a dedicated email sent to the end-user (no need to install agent).

Protect Against Data Breaches Both Externally and Internally

Chariot Infotech DLP controls sensitive information from leaving the company. DLP also inspects and controls sensitive emails between departments with Microsoft Exchange support. An agent is loaded onto the Microsoft Exchange server that intercepts outgoing messages. The message is redirected to the Gateway, is inspected by the active DLP Software, and then sent to the internal recipient by the Exchange server. Policies can be defined to prevent confidential data from leaking to the wrong departments. Examples of data that might need protecting from accidental leakage to other departments are compensation plans, confidential human resources documents, mergers and acquisition documents, or medical forms.

Inspect SSL Encrypted Traffic

Scan and secure SSL encrypted traffic passing through the gateway. When traffic is passed through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.

For example, Gmail traffic is encrypted over HTTPS. If a user attaches a file to a message in Gmail, both the email and file will be inspected by DLP and be subject to the same policy as any clear (unencrypted) traffic.

Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be inspected, and therefore can be bypassed with a simple administrator policy definition.

Data Classification

The innovative Chariot Infotech data classification engine combines users, content and process into accurate decisions. Chariot Infotech DLP delivers exceptionally high accuracy in identifying sensitive data including Personally Identifiable Information (PII), compliance-related data (HIPAA, SOX, PCI, etc.) and confidential business data. This is achieved through a strong 3-tier inspection engine that:

  • Offers multi-parameter data classification and correlation - Multi-protocol inspection and enforcement inspects content flows and enforces policies in the most widely used TCP protocols including: SMTP, FTP, HTTP and webmail. Pattern matching and file classification allows for the identification of content types regardless of the extension applied to the file or compression.
  • Recognizes and protects sensitive forms - Includes file/ form matching (based on predefined templates)
  • Identifies unconventional business communication behavior
  • Leverages out-of-the-box best practice policies
Network-wide Protection Coverage

The Chariot Infotech DLP system is an in-line, advanced data loss prevention solution for data transmitted over networks. It offers wide coverage of traffic transport types, including deep application awareness that protects data in motion, such as SMTP, HTTP and FTP data. DLP policies are created to define what to prevent and how to prevent it, by policy, by network segment, by gateway and by user-group.

Fingerprint Sensitive Files

DLP scans file repositories of sensitive files and match when a file from this repository (or part of it) leaves the organization. With files matching, sensitive files are prevented from leaving the organization.

Central Policy Management

Centralized management offers unmatched leverage and control of security policies and enables organizations to use a single repository for user and group definitions, network objects, access rights and security policies across their entire security infrastructure. Unified access policies are enforced automatically throughout the distributed environment, empowering them to securely provision access from anywhere.

Unified policy deployment across multiple gateways controls enforcement actions per policy; i.e. detect (log only), or quarantine (self-incident handling). Policy management includes the following features and options:

  • Selection of data type(s) and user group(s) - also using Active Directory
  • Enable exceptions - allowed users
  • Traffic direction - enforce on outbound or inter-departmental traffic
  • Pre-defined policies and content data types
  • Incremental exposure of specific policies per different user groups
  • Integrated logging and event correlation
  • Customization of internal quarantine
Rapid and Flexible Deployment

Organizations of any size can be protected from the start with Chariot Infotech data loss prevention program. A wide range of built-in policies and rules are included for common requirements, including regulatory compliance, intellectual property and acceptable use.

Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data.


Now is the time you start getting more online

Request A Free Quote