SlideShare a Scribd company logo
1 of 2
Download to read offline
WatchGuard® Technologies, Inc.
Datasheet
Data Loss Preventionwith WatchGuard® XCS Solutions
Data Loss Prevention is built into
all WatchGuard® XCS appliance
models as a powerful business
tool for controlling confidential
information as it moves across
network boundaries.
This allows you to protect the growing volume
of private data that traverses your network to
prevent accidental or malicious data leakage in
a single solution, without the need for multiple
point products.
Data loss prevention and privacy tools give
you the ability to both secure information as
needed to maintain policy compliance, as well as
share authorized sensitive information securely
with business partners outside the company.
With a WatchGuard XCS appliance, you have an
automatic, extensive risk management and policy
enforcement boundary of outbound content.
This ensures privacy and compliance, but does
not impede the flow of your legitimate electronic
business communications.
Protect confidential data as it moves outside your organization’s
WatchGuard XCS email security solutions automatically incorporate powerful data loss prevention
(DLP) capabilities to ensure that the content of outgoing email messages is in strict accord with
your organization’s confidentiality and regulatory compliance policies. Adding an XCS Web Security
subscription (available for all XCS models) extends those capabilities to your web-based traffic as well,
for comprehensive coverage across protocols.
HOW DATA LOSS PREVENTION WITHIN YOUR CORPORATE EMAIL SYSTEM WORKS
SIMPLIFIED AND EFFECTIVE POLICY MANAGEMENT
	DLP Wizard guides administrators through DLP configuration controls quickly and simply, allowing you
to gain privacy and compliance and define remediation actions with a few simple clicks.
	 Centralized policy management provides a single point of administration for creating, managing
and enforcing content security and data loss policies to eliminate data loss gaps.
	Pre-defined compliance dictionaries streamline the policy-setting process for HIPAA, PCI,
GLBA and other regulations, and are customizable to conform with your unique business
requirements and compliance regulations.
	Custom policies for groups or individuals can be set to control who can send what and to whom
without impeding critical business processes. Content controls include flexible and granular tools
including the ability to set complex rules and even nest rules within one another.
POWERFUL CONTENT  CONTEXTUAL ANALYSIS
ACCURATELY DETECTS POLICY VIOLATIONS
	Defense-in-depth methodology scans all outbound content (including files and attachments)
and inspects context of the traffic (who is sending the data, where or to whom) to determine if
there is a policy violation.
	Attachment scanning  control provides the ability to apply existing content scanning policies to
more than 400 file attachment types. Compressed file attachments can also be scanned to ensure
sensitive information does not leave the organization.
	Applied intelligence learns from previously allowed content to make future decisions more
accurately and faster.
	Data discovery and classification tools allow you to protect known confidential or sensitive data
files, thereby training the system on what to look for and subsequent remediation actions to be
taken upon discovery of such data.
TRANSPARENT REMEDIATION PROVIDES UNPARALLELED CONTROL  VISIBILITY
	Instant-on remediation actions are instantly applied when policy violations are detected for
transparent protection, control and visibility of information leaving your organization. Options
include block, quarantine, allow, encrypt, blind copy, or reroute content.
	Seamless email encryption, easily added to your solution with a WatchGuard SecureMail Email
Encryption subscription, allows you to securely transmit and receive private, sensitive, and regulated
information without hindering the free flow of critical business communications.	
GRANULAR LOGGING AND REPORTING FOR AUDIT REQUIREMENTS
	Policy violation alerts and the remediation actions taken are triggered instantly for immediate
visibility.
	Granular logs and one-click administration for customizable reports of policy violations
are easily accessible to meet audit requirements.
ADDRESS 505 Fifth Avenue South, Suite 500, Seattle, WA 98104 WEB www.watchguard.com U.S. SALES 1.800.734.9905 International Sales +1.206.613.0895
No express or implied warranties are provided for herein. All specifications are subject to change and expected future products, features or functionality will be provided on an if and when available basis. © 2012 WatchGuard Technologies, Inc. All rights reserved. WatchGuard,
the WatchGuard logo, Fireware, and LiveSecurity are either trademarks or registered trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other tradenames are the property of their respective owners. Part No. WGCE66739_102212
WatchGuard XCS Integrated Process
for Data Loss Prevention
Data Loss Prevention is integrated into all WatchGuard XCS models.
It provides comprehensive, instant protection from information loss.
The system uses an integrated process for inspection, discovery,
and remediation of policy violations for outbound communications
containing sensitive content.
1. Examine. Outbound communications are checked for private or
sensitive data, including personal information and intellectual
property.
2. Determine. The sophisticated XCS policy engine determines the
appropriate action to take on a message, based on pre-defined
policies.
Policies are determined by the organization using customizable
templates that aggregate internal policy with compliance-driven
regulations
	 Industry-specific compliance dictionaries, including dictionaries for
PCI, HIPAA and GLB, help make policy generation fast and effective.
3. Take Action: Take the appropriate action on the message instantly,
without the need for manual intervention. Depending on pre-
defined policies, the message can be allowed, blocked, encrypted,
copied to a compliance officer, stamped, returned to sender, and/or
entered in the audit/log.
4. Report. It is important to be able to easily document the policies
that have been implemented to enforce the regulations, as well
as tracking actual message traffic to ensure compliance. XCS
solutions provide granular logs for customizable reports of violations
and remediation action taken to meet audit requirements.
Extend Data Loss Prevention to Web Traffic
The Web provides many exit points for sensitive information to
leave your organization, including communications sent by popmail
systems (hotmail, gmail, etc.), wikis, blogs, and social networks such as
Facebook. Adding a Web Security subscription extends the data loss
prevention capabilities of your XCS appliance* to include HTTP traffic,
for comprehensive protection across protocols.
	Scans content in all outbound web traffic, including attachments,
for policy violations.
	Inspects context in which communication is sent including who is
sending the data, where it is being sent, and to whom.
	Uses the same policies developed for your organization’s email
communications to save time and ensure strong and consistent
enforcement.
	Allows administrator to manage data loss prevention across
protocols from one easy-to-use administrative console.
	Provides consolidated visibility and control so you can meet
stringent compliance requirements.
* Web Security subscriptions are available for all XCS models.
For more information on Data Loss Prevention capabilities and
our complete line of powerful WatchGuard XCS solutions, visit
www.watchguard.com/xcs.
Examine
Examine entire content
including attachments
Determine
Determine if content and
context is in accordance
with defined policies
Report
Monitor and provide
reports to demonstrate
compliance and
identify gaps
Deliver content in
accordance with
defined policies - send,
copy, encrypt, block
X
Privacy  Compliance Engine
Inspect - Filters
Validate - Dictionaries
Decide - Policies
X
Deliver
Integrated Process for Privacy and Compliance Protection

More Related Content

What's hot

What's hot (20)

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | Seclore
 
Security 24 - Seclore
Security 24 - SecloreSecurity 24 - Seclore
Security 24 - Seclore
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Cloud Security is not equal to Cloud Data Security
Cloud Security is not equal to Cloud Data SecurityCloud Security is not equal to Cloud Data Security
Cloud Security is not equal to Cloud Data Security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Bring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreBring Your Own Encryption | Seclore
Bring Your Own Encryption | Seclore
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical Industry
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
 
Securing Remote Workforce | Seclore
Securing Remote Workforce | SecloreSecuring Remote Workforce | Seclore
Securing Remote Workforce | Seclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For Email
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security
 
Data Security
Data SecurityData Security
Data Security
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
Seclore for Titus
Seclore for TitusSeclore for Titus
Seclore for Titus
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
 

Similar to Data Loss Prevention with WatchGuard XCS Solutions

cloud-security
cloud-securitycloud-security
cloud-security
Asun Sada
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
griffinruthie22
 

Similar to Data Loss Prevention with WatchGuard XCS Solutions (20)

The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial Services
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITOR
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Ingres database and compliance
Ingres database and complianceIngres database and compliance
Ingres database and compliance
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 

More from Jone Smith

More from Jone Smith (20)

Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP
Efficient Data Center Virtualization with QLogic 10GbE Solutions from HPEfficient Data Center Virtualization with QLogic 10GbE Solutions from HP
Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP
 
Storage Networking Solutions for High Performance Databases by QLogic
Storage Networking Solutions for High Performance Databases by QLogicStorage Networking Solutions for High Performance Databases by QLogic
Storage Networking Solutions for High Performance Databases by QLogic
 
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer Cellular
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer CellularMOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer Cellular
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer Cellular
 
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...
 
Track, locate and manage your assets with Smart Asset Management Software by ...
Track, locate and manage your assets with Smart Asset Management Software by ...Track, locate and manage your assets with Smart Asset Management Software by ...
Track, locate and manage your assets with Smart Asset Management Software by ...
 
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
 
The value of pre adjudication in healthcare claims processing - banc tec's wh...
The value of pre adjudication in healthcare claims processing - banc tec's wh...The value of pre adjudication in healthcare claims processing - banc tec's wh...
The value of pre adjudication in healthcare claims processing - banc tec's wh...
 
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider Company
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider CompanyFast, Cheaper and Better Content Conversion by Systemware - ECM Provider Company
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider Company
 
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...
 
Gain Operational Excellence through Transportation Management System by Apptr...
Gain Operational Excellence through Transportation Management System by Apptr...Gain Operational Excellence through Transportation Management System by Apptr...
Gain Operational Excellence through Transportation Management System by Apptr...
 
Operational Excellence through Transportation Management System by Apptricity
Operational Excellence through Transportation Management System by ApptricityOperational Excellence through Transportation Management System by Apptricity
Operational Excellence through Transportation Management System by Apptricity
 
Increased Company Cost Savings by Apptricity E-Procurement Software
Increased Company Cost Savings by Apptricity E-Procurement SoftwareIncreased Company Cost Savings by Apptricity E-Procurement Software
Increased Company Cost Savings by Apptricity E-Procurement Software
 
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services Provider
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services ProviderOptimizing Accounts Payable - Whitepaper by BancTec - BPO Services Provider
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services Provider
 
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...Automating Healthcare Payment and Claims Remittance Processing - Systemware's...
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...
 
Automating healthcare payment and claims remittance processing systemware's...
Automating healthcare payment and claims remittance processing   systemware's...Automating healthcare payment and claims remittance processing   systemware's...
Automating healthcare payment and claims remittance processing systemware's...
 
Evolution of the Paperless Accounts Payable Department - BancTec
Evolution of the Paperless Accounts Payable Department - BancTecEvolution of the Paperless Accounts Payable Department - BancTec
Evolution of the Paperless Accounts Payable Department - BancTec
 
Worldwide express business reinvestment model press release by dallas busin...
Worldwide express business reinvestment model   press release by dallas busin...Worldwide express business reinvestment model   press release by dallas busin...
Worldwide express business reinvestment model press release by dallas busin...
 
Worldwide express business reinvestment model press release by dallas busin...
Worldwide express business reinvestment model   press release by dallas busin...Worldwide express business reinvestment model   press release by dallas busin...
Worldwide express business reinvestment model press release by dallas busin...
 
Operational excellence through transportation management by apptricity
Operational excellence through transportation management by apptricityOperational excellence through transportation management by apptricity
Operational excellence through transportation management by apptricity
 
Plan Before You Outsource
Plan Before You OutsourcePlan Before You Outsource
Plan Before You Outsource
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Recently uploaded (20)

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Data Loss Prevention with WatchGuard XCS Solutions

  • 1. WatchGuard® Technologies, Inc. Datasheet Data Loss Preventionwith WatchGuard® XCS Solutions Data Loss Prevention is built into all WatchGuard® XCS appliance models as a powerful business tool for controlling confidential information as it moves across network boundaries. This allows you to protect the growing volume of private data that traverses your network to prevent accidental or malicious data leakage in a single solution, without the need for multiple point products. Data loss prevention and privacy tools give you the ability to both secure information as needed to maintain policy compliance, as well as share authorized sensitive information securely with business partners outside the company. With a WatchGuard XCS appliance, you have an automatic, extensive risk management and policy enforcement boundary of outbound content. This ensures privacy and compliance, but does not impede the flow of your legitimate electronic business communications. Protect confidential data as it moves outside your organization’s WatchGuard XCS email security solutions automatically incorporate powerful data loss prevention (DLP) capabilities to ensure that the content of outgoing email messages is in strict accord with your organization’s confidentiality and regulatory compliance policies. Adding an XCS Web Security subscription (available for all XCS models) extends those capabilities to your web-based traffic as well, for comprehensive coverage across protocols. HOW DATA LOSS PREVENTION WITHIN YOUR CORPORATE EMAIL SYSTEM WORKS SIMPLIFIED AND EFFECTIVE POLICY MANAGEMENT DLP Wizard guides administrators through DLP configuration controls quickly and simply, allowing you to gain privacy and compliance and define remediation actions with a few simple clicks. Centralized policy management provides a single point of administration for creating, managing and enforcing content security and data loss policies to eliminate data loss gaps. Pre-defined compliance dictionaries streamline the policy-setting process for HIPAA, PCI, GLBA and other regulations, and are customizable to conform with your unique business requirements and compliance regulations. Custom policies for groups or individuals can be set to control who can send what and to whom without impeding critical business processes. Content controls include flexible and granular tools including the ability to set complex rules and even nest rules within one another. POWERFUL CONTENT CONTEXTUAL ANALYSIS ACCURATELY DETECTS POLICY VIOLATIONS Defense-in-depth methodology scans all outbound content (including files and attachments) and inspects context of the traffic (who is sending the data, where or to whom) to determine if there is a policy violation. Attachment scanning control provides the ability to apply existing content scanning policies to more than 400 file attachment types. Compressed file attachments can also be scanned to ensure sensitive information does not leave the organization. Applied intelligence learns from previously allowed content to make future decisions more accurately and faster. Data discovery and classification tools allow you to protect known confidential or sensitive data files, thereby training the system on what to look for and subsequent remediation actions to be taken upon discovery of such data. TRANSPARENT REMEDIATION PROVIDES UNPARALLELED CONTROL VISIBILITY Instant-on remediation actions are instantly applied when policy violations are detected for transparent protection, control and visibility of information leaving your organization. Options include block, quarantine, allow, encrypt, blind copy, or reroute content. Seamless email encryption, easily added to your solution with a WatchGuard SecureMail Email Encryption subscription, allows you to securely transmit and receive private, sensitive, and regulated information without hindering the free flow of critical business communications. GRANULAR LOGGING AND REPORTING FOR AUDIT REQUIREMENTS Policy violation alerts and the remediation actions taken are triggered instantly for immediate visibility. Granular logs and one-click administration for customizable reports of policy violations are easily accessible to meet audit requirements.
  • 2. ADDRESS 505 Fifth Avenue South, Suite 500, Seattle, WA 98104 WEB www.watchguard.com U.S. SALES 1.800.734.9905 International Sales +1.206.613.0895 No express or implied warranties are provided for herein. All specifications are subject to change and expected future products, features or functionality will be provided on an if and when available basis. © 2012 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, Fireware, and LiveSecurity are either trademarks or registered trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other tradenames are the property of their respective owners. Part No. WGCE66739_102212 WatchGuard XCS Integrated Process for Data Loss Prevention Data Loss Prevention is integrated into all WatchGuard XCS models. It provides comprehensive, instant protection from information loss. The system uses an integrated process for inspection, discovery, and remediation of policy violations for outbound communications containing sensitive content. 1. Examine. Outbound communications are checked for private or sensitive data, including personal information and intellectual property. 2. Determine. The sophisticated XCS policy engine determines the appropriate action to take on a message, based on pre-defined policies. Policies are determined by the organization using customizable templates that aggregate internal policy with compliance-driven regulations Industry-specific compliance dictionaries, including dictionaries for PCI, HIPAA and GLB, help make policy generation fast and effective. 3. Take Action: Take the appropriate action on the message instantly, without the need for manual intervention. Depending on pre- defined policies, the message can be allowed, blocked, encrypted, copied to a compliance officer, stamped, returned to sender, and/or entered in the audit/log. 4. Report. It is important to be able to easily document the policies that have been implemented to enforce the regulations, as well as tracking actual message traffic to ensure compliance. XCS solutions provide granular logs for customizable reports of violations and remediation action taken to meet audit requirements. Extend Data Loss Prevention to Web Traffic The Web provides many exit points for sensitive information to leave your organization, including communications sent by popmail systems (hotmail, gmail, etc.), wikis, blogs, and social networks such as Facebook. Adding a Web Security subscription extends the data loss prevention capabilities of your XCS appliance* to include HTTP traffic, for comprehensive protection across protocols. Scans content in all outbound web traffic, including attachments, for policy violations. Inspects context in which communication is sent including who is sending the data, where it is being sent, and to whom. Uses the same policies developed for your organization’s email communications to save time and ensure strong and consistent enforcement. Allows administrator to manage data loss prevention across protocols from one easy-to-use administrative console. Provides consolidated visibility and control so you can meet stringent compliance requirements. * Web Security subscriptions are available for all XCS models. For more information on Data Loss Prevention capabilities and our complete line of powerful WatchGuard XCS solutions, visit www.watchguard.com/xcs. Examine Examine entire content including attachments Determine Determine if content and context is in accordance with defined policies Report Monitor and provide reports to demonstrate compliance and identify gaps Deliver content in accordance with defined policies - send, copy, encrypt, block X Privacy Compliance Engine Inspect - Filters Validate - Dictionaries Decide - Policies X Deliver Integrated Process for Privacy and Compliance Protection