SlideShare a Scribd company logo
1 of 2
Download to read offline
WatchGuard® Technologies, Inc.
Datasheet
Data Loss Preventionwith WatchGuard® XCS Solutions
Data Loss Prevention is built into
all WatchGuard® XCS appliance
models as a powerful business
tool for controlling confidential
information as it moves across
network boundaries.
This allows you to protect the growing volume
of private data that traverses your network to
prevent accidental or malicious data leakage in
a single solution, without the need for multiple
point products.
Data loss prevention and privacy tools give
you the ability to both secure information as
needed to maintain policy compliance, as well as
share authorized sensitive information securely
with business partners outside the company.
With a WatchGuard XCS appliance, you have an
automatic, extensive risk management and policy
enforcement boundary of outbound content.
This ensures privacy and compliance, but does
not impede the flow of your legitimate electronic
business communications.
Protect confidential data as it moves outside your organization’s
WatchGuard XCS email security solutions automatically incorporate powerful data loss prevention
(DLP) capabilities to ensure that the content of outgoing email messages is in strict accord with
your organization’s confidentiality and regulatory compliance policies. Adding an XCS Web Security
subscription (available for all XCS models) extends those capabilities to your web-based traffic as well,
for comprehensive coverage across protocols.
HOW DATA LOSS PREVENTION WITHIN YOUR CORPORATE EMAIL SYSTEM WORKS
SIMPLIFIED AND EFFECTIVE POLICY MANAGEMENT
	DLP Wizard guides administrators through DLP configuration controls quickly and simply, allowing you
to gain privacy and compliance and define remediation actions with a few simple clicks.
	 Centralized policy management provides a single point of administration for creating, managing
and enforcing content security and data loss policies to eliminate data loss gaps.
	Pre-defined compliance dictionaries streamline the policy-setting process for HIPAA, PCI,
GLBA and other regulations, and are customizable to conform with your unique business
requirements and compliance regulations.
	Custom policies for groups or individuals can be set to control who can send what and to whom
without impeding critical business processes. Content controls include flexible and granular tools
including the ability to set complex rules and even nest rules within one another.
POWERFUL CONTENT  CONTEXTUAL ANALYSIS
ACCURATELY DETECTS POLICY VIOLATIONS
	Defense-in-depth methodology scans all outbound content (including files and attachments)
and inspects context of the traffic (who is sending the data, where or to whom) to determine if
there is a policy violation.
	Attachment scanning  control provides the ability to apply existing content scanning policies to
more than 400 file attachment types. Compressed file attachments can also be scanned to ensure
sensitive information does not leave the organization.
	Applied intelligence learns from previously allowed content to make future decisions more
accurately and faster.
	Data discovery and classification tools allow you to protect known confidential or sensitive data
files, thereby training the system on what to look for and subsequent remediation actions to be
taken upon discovery of such data.
TRANSPARENT REMEDIATION PROVIDES UNPARALLELED CONTROL  VISIBILITY
	Instant-on remediation actions are instantly applied when policy violations are detected for
transparent protection, control and visibility of information leaving your organization. Options
include block, quarantine, allow, encrypt, blind copy, or reroute content.
	Seamless email encryption, easily added to your solution with a WatchGuard SecureMail Email
Encryption subscription, allows you to securely transmit and receive private, sensitive, and regulated
information without hindering the free flow of critical business communications.	
GRANULAR LOGGING AND REPORTING FOR AUDIT REQUIREMENTS
	Policy violation alerts and the remediation actions taken are triggered instantly for immediate
visibility.
	Granular logs and one-click administration for customizable reports of policy violations
are easily accessible to meet audit requirements.
ADDRESS 505 Fifth Avenue South, Suite 500, Seattle, WA 98104 WEB www.watchguard.com U.S. SALES 1.800.734.9905 International Sales +1.206.613.0895
No express or implied warranties are provided for herein. All specifications are subject to change and expected future products, features or functionality will be provided on an if and when available basis. © 2012 WatchGuard Technologies, Inc. All rights reserved. WatchGuard,
the WatchGuard logo, Fireware, and LiveSecurity are either trademarks or registered trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other tradenames are the property of their respective owners. Part No. WGCE66739_102212
WatchGuard XCS Integrated Process
for Data Loss Prevention
Data Loss Prevention is integrated into all WatchGuard XCS models.
It provides comprehensive, instant protection from information loss.
The system uses an integrated process for inspection, discovery,
and remediation of policy violations for outbound communications
containing sensitive content.
1. Examine. Outbound communications are checked for private or
sensitive data, including personal information and intellectual
property.
2. Determine. The sophisticated XCS policy engine determines the
appropriate action to take on a message, based on pre-defined
policies.
Policies are determined by the organization using customizable
templates that aggregate internal policy with compliance-driven
regulations
	 Industry-specific compliance dictionaries, including dictionaries for
PCI, HIPAA and GLB, help make policy generation fast and effective.
3. Take Action: Take the appropriate action on the message instantly,
without the need for manual intervention. Depending on pre-
defined policies, the message can be allowed, blocked, encrypted,
copied to a compliance officer, stamped, returned to sender, and/or
entered in the audit/log.
4. Report. It is important to be able to easily document the policies
that have been implemented to enforce the regulations, as well
as tracking actual message traffic to ensure compliance. XCS
solutions provide granular logs for customizable reports of violations
and remediation action taken to meet audit requirements.
Extend Data Loss Prevention to Web Traffic
The Web provides many exit points for sensitive information to
leave your organization, including communications sent by popmail
systems (hotmail, gmail, etc.), wikis, blogs, and social networks such as
Facebook. Adding a Web Security subscription extends the data loss
prevention capabilities of your XCS appliance* to include HTTP traffic,
for comprehensive protection across protocols.
	Scans content in all outbound web traffic, including attachments,
for policy violations.
	Inspects context in which communication is sent including who is
sending the data, where it is being sent, and to whom.
	Uses the same policies developed for your organization’s email
communications to save time and ensure strong and consistent
enforcement.
	Allows administrator to manage data loss prevention across
protocols from one easy-to-use administrative console.
	Provides consolidated visibility and control so you can meet
stringent compliance requirements.
* Web Security subscriptions are available for all XCS models.
For more information on Data Loss Prevention capabilities and
our complete line of powerful WatchGuard XCS solutions, visit
www.watchguard.com/xcs.
Examine
Examine entire content
including attachments
Determine
Determine if content and
context is in accordance
with defined policies
Report
Monitor and provide
reports to demonstrate
compliance and
identify gaps
Deliver content in
accordance with
defined policies - send,
copy, encrypt, block
X
Privacy  Compliance Engine
Inspect - Filters
Validate - Dictionaries
Decide - Policies
X
Deliver
Integrated Process for Privacy and Compliance Protection

More Related Content

What's hot

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreSeclore
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | SecloreSeclore
 
Security 24 - Seclore
Security 24 - SecloreSecurity 24 - Seclore
Security 24 - SecloreSeclore
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreSeclore
 
Cloud Security is not equal to Cloud Data Security
Cloud Security is not equal to Cloud Data SecurityCloud Security is not equal to Cloud Data Security
Cloud Security is not equal to Cloud Data SecuritySeclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Bring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreBring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreSeclore
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustrySeclore
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore
 
Securing Remote Workforce | Seclore
Securing Remote Workforce | SecloreSecuring Remote Workforce | Seclore
Securing Remote Workforce | SecloreSeclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRMSeclore
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | SecloreSeclore
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For EmailSeclore
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security Seclore
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
Seclore for Titus
Seclore for TitusSeclore for Titus
Seclore for TitusSeclore
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | SecloreSeclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Seclore
 

What's hot (20)

IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | Seclore
 
Security 24 - Seclore
Security 24 - SecloreSecurity 24 - Seclore
Security 24 - Seclore
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Cloud Security is not equal to Cloud Data Security
Cloud Security is not equal to Cloud Data SecurityCloud Security is not equal to Cloud Data Security
Cloud Security is not equal to Cloud Data Security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Bring Your Own Encryption | Seclore
Bring Your Own Encryption | SecloreBring Your Own Encryption | Seclore
Bring Your Own Encryption | Seclore
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical Industry
 
Seclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity LabelsSeclore For Microsoft’s Sensitivity Labels
Seclore For Microsoft’s Sensitivity Labels
 
Securing Remote Workforce | Seclore
Securing Remote Workforce | SecloreSecuring Remote Workforce | Seclore
Securing Remote Workforce | Seclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
DLP Solutions Protection | Seclore
DLP Solutions Protection |  SecloreDLP Solutions Protection |  Seclore
DLP Solutions Protection | Seclore
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For Email
 
NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security NIST Compliance & Data Centric Security
NIST Compliance & Data Centric Security
 
Data Security
Data SecurityData Security
Data Security
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
Seclore for Titus
Seclore for TitusSeclore for Titus
Seclore for Titus
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security Rbi compliance and Data Centric Security
Rbi compliance and Data Centric Security
 

Similar to Data Loss Prevention with WatchGuard XCS Solutions

The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
cloud-security
cloud-securitycloud-security
cloud-securityAsun Sada
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesDebbie A. Everson
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for SlackSachin Yadav
 
INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORInfosec Train
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxgriffinruthie22
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classificationDavid De Vos
 

Similar to Data Loss Prevention with WatchGuard XCS Solutions (20)

The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial Services
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITOR
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Ingres database and compliance
Ingres database and complianceIngres database and compliance
Ingres database and compliance
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 

More from Jone Smith

Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP
Efficient Data Center Virtualization with QLogic 10GbE Solutions from HPEfficient Data Center Virtualization with QLogic 10GbE Solutions from HP
Efficient Data Center Virtualization with QLogic 10GbE Solutions from HPJone Smith
 
Storage Networking Solutions for High Performance Databases by QLogic
Storage Networking Solutions for High Performance Databases by QLogicStorage Networking Solutions for High Performance Databases by QLogic
Storage Networking Solutions for High Performance Databases by QLogicJone Smith
 
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer Cellular
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer CellularMOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer Cellular
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer CellularJone Smith
 
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...Jone Smith
 
Track, locate and manage your assets with Smart Asset Management Software by ...
Track, locate and manage your assets with Smart Asset Management Software by ...Track, locate and manage your assets with Smart Asset Management Software by ...
Track, locate and manage your assets with Smart Asset Management Software by ...Jone Smith
 
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Jone Smith
 
The value of pre adjudication in healthcare claims processing - banc tec's wh...
The value of pre adjudication in healthcare claims processing - banc tec's wh...The value of pre adjudication in healthcare claims processing - banc tec's wh...
The value of pre adjudication in healthcare claims processing - banc tec's wh...Jone Smith
 
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider Company
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider CompanyFast, Cheaper and Better Content Conversion by Systemware - ECM Provider Company
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider CompanyJone Smith
 
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...Jone Smith
 
Gain Operational Excellence through Transportation Management System by Apptr...
Gain Operational Excellence through Transportation Management System by Apptr...Gain Operational Excellence through Transportation Management System by Apptr...
Gain Operational Excellence through Transportation Management System by Apptr...Jone Smith
 
Operational Excellence through Transportation Management System by Apptricity
Operational Excellence through Transportation Management System by ApptricityOperational Excellence through Transportation Management System by Apptricity
Operational Excellence through Transportation Management System by ApptricityJone Smith
 
Increased Company Cost Savings by Apptricity E-Procurement Software
Increased Company Cost Savings by Apptricity E-Procurement SoftwareIncreased Company Cost Savings by Apptricity E-Procurement Software
Increased Company Cost Savings by Apptricity E-Procurement SoftwareJone Smith
 
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services Provider
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services ProviderOptimizing Accounts Payable - Whitepaper by BancTec - BPO Services Provider
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services ProviderJone Smith
 
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...Automating Healthcare Payment and Claims Remittance Processing - Systemware's...
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...Jone Smith
 
Automating healthcare payment and claims remittance processing systemware's...
Automating healthcare payment and claims remittance processing   systemware's...Automating healthcare payment and claims remittance processing   systemware's...
Automating healthcare payment and claims remittance processing systemware's...Jone Smith
 
Evolution of the Paperless Accounts Payable Department - BancTec
Evolution of the Paperless Accounts Payable Department - BancTecEvolution of the Paperless Accounts Payable Department - BancTec
Evolution of the Paperless Accounts Payable Department - BancTecJone Smith
 
Worldwide express business reinvestment model press release by dallas busin...
Worldwide express business reinvestment model   press release by dallas busin...Worldwide express business reinvestment model   press release by dallas busin...
Worldwide express business reinvestment model press release by dallas busin...Jone Smith
 
Worldwide express business reinvestment model press release by dallas busin...
Worldwide express business reinvestment model   press release by dallas busin...Worldwide express business reinvestment model   press release by dallas busin...
Worldwide express business reinvestment model press release by dallas busin...Jone Smith
 
Operational excellence through transportation management by apptricity
Operational excellence through transportation management by apptricityOperational excellence through transportation management by apptricity
Operational excellence through transportation management by apptricityJone Smith
 
Plan Before You Outsource
Plan Before You OutsourcePlan Before You Outsource
Plan Before You OutsourceJone Smith
 

More from Jone Smith (20)

Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP
Efficient Data Center Virtualization with QLogic 10GbE Solutions from HPEfficient Data Center Virtualization with QLogic 10GbE Solutions from HP
Efficient Data Center Virtualization with QLogic 10GbE Solutions from HP
 
Storage Networking Solutions for High Performance Databases by QLogic
Storage Networking Solutions for High Performance Databases by QLogicStorage Networking Solutions for High Performance Databases by QLogic
Storage Networking Solutions for High Performance Databases by QLogic
 
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer Cellular
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer CellularMOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer Cellular
MOTOROLA BRAVO with MOTOBLUR User's Guide - Consumer Cellular
 
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...
Is Your Business at Risk? Document Management Facts & Aspects - Whitepaper By...
 
Track, locate and manage your assets with Smart Asset Management Software by ...
Track, locate and manage your assets with Smart Asset Management Software by ...Track, locate and manage your assets with Smart Asset Management Software by ...
Track, locate and manage your assets with Smart Asset Management Software by ...
 
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...
 
The value of pre adjudication in healthcare claims processing - banc tec's wh...
The value of pre adjudication in healthcare claims processing - banc tec's wh...The value of pre adjudication in healthcare claims processing - banc tec's wh...
The value of pre adjudication in healthcare claims processing - banc tec's wh...
 
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider Company
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider CompanyFast, Cheaper and Better Content Conversion by Systemware - ECM Provider Company
Fast, Cheaper and Better Content Conversion by Systemware - ECM Provider Company
 
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...
Optimizing Accounts Payable Automation Solution - Whitepaper by BancTec - BPO...
 
Gain Operational Excellence through Transportation Management System by Apptr...
Gain Operational Excellence through Transportation Management System by Apptr...Gain Operational Excellence through Transportation Management System by Apptr...
Gain Operational Excellence through Transportation Management System by Apptr...
 
Operational Excellence through Transportation Management System by Apptricity
Operational Excellence through Transportation Management System by ApptricityOperational Excellence through Transportation Management System by Apptricity
Operational Excellence through Transportation Management System by Apptricity
 
Increased Company Cost Savings by Apptricity E-Procurement Software
Increased Company Cost Savings by Apptricity E-Procurement SoftwareIncreased Company Cost Savings by Apptricity E-Procurement Software
Increased Company Cost Savings by Apptricity E-Procurement Software
 
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services Provider
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services ProviderOptimizing Accounts Payable - Whitepaper by BancTec - BPO Services Provider
Optimizing Accounts Payable - Whitepaper by BancTec - BPO Services Provider
 
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...Automating Healthcare Payment and Claims Remittance Processing - Systemware's...
Automating Healthcare Payment and Claims Remittance Processing - Systemware's...
 
Automating healthcare payment and claims remittance processing systemware's...
Automating healthcare payment and claims remittance processing   systemware's...Automating healthcare payment and claims remittance processing   systemware's...
Automating healthcare payment and claims remittance processing systemware's...
 
Evolution of the Paperless Accounts Payable Department - BancTec
Evolution of the Paperless Accounts Payable Department - BancTecEvolution of the Paperless Accounts Payable Department - BancTec
Evolution of the Paperless Accounts Payable Department - BancTec
 
Worldwide express business reinvestment model press release by dallas busin...
Worldwide express business reinvestment model   press release by dallas busin...Worldwide express business reinvestment model   press release by dallas busin...
Worldwide express business reinvestment model press release by dallas busin...
 
Worldwide express business reinvestment model press release by dallas busin...
Worldwide express business reinvestment model   press release by dallas busin...Worldwide express business reinvestment model   press release by dallas busin...
Worldwide express business reinvestment model press release by dallas busin...
 
Operational excellence through transportation management by apptricity
Operational excellence through transportation management by apptricityOperational excellence through transportation management by apptricity
Operational excellence through transportation management by apptricity
 
Plan Before You Outsource
Plan Before You OutsourcePlan Before You Outsource
Plan Before You Outsource
 

Recently uploaded

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 

Recently uploaded (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 

Data Loss Prevention with WatchGuard XCS Solutions

  • 1. WatchGuard® Technologies, Inc. Datasheet Data Loss Preventionwith WatchGuard® XCS Solutions Data Loss Prevention is built into all WatchGuard® XCS appliance models as a powerful business tool for controlling confidential information as it moves across network boundaries. This allows you to protect the growing volume of private data that traverses your network to prevent accidental or malicious data leakage in a single solution, without the need for multiple point products. Data loss prevention and privacy tools give you the ability to both secure information as needed to maintain policy compliance, as well as share authorized sensitive information securely with business partners outside the company. With a WatchGuard XCS appliance, you have an automatic, extensive risk management and policy enforcement boundary of outbound content. This ensures privacy and compliance, but does not impede the flow of your legitimate electronic business communications. Protect confidential data as it moves outside your organization’s WatchGuard XCS email security solutions automatically incorporate powerful data loss prevention (DLP) capabilities to ensure that the content of outgoing email messages is in strict accord with your organization’s confidentiality and regulatory compliance policies. Adding an XCS Web Security subscription (available for all XCS models) extends those capabilities to your web-based traffic as well, for comprehensive coverage across protocols. HOW DATA LOSS PREVENTION WITHIN YOUR CORPORATE EMAIL SYSTEM WORKS SIMPLIFIED AND EFFECTIVE POLICY MANAGEMENT DLP Wizard guides administrators through DLP configuration controls quickly and simply, allowing you to gain privacy and compliance and define remediation actions with a few simple clicks. Centralized policy management provides a single point of administration for creating, managing and enforcing content security and data loss policies to eliminate data loss gaps. Pre-defined compliance dictionaries streamline the policy-setting process for HIPAA, PCI, GLBA and other regulations, and are customizable to conform with your unique business requirements and compliance regulations. Custom policies for groups or individuals can be set to control who can send what and to whom without impeding critical business processes. Content controls include flexible and granular tools including the ability to set complex rules and even nest rules within one another. POWERFUL CONTENT CONTEXTUAL ANALYSIS ACCURATELY DETECTS POLICY VIOLATIONS Defense-in-depth methodology scans all outbound content (including files and attachments) and inspects context of the traffic (who is sending the data, where or to whom) to determine if there is a policy violation. Attachment scanning control provides the ability to apply existing content scanning policies to more than 400 file attachment types. Compressed file attachments can also be scanned to ensure sensitive information does not leave the organization. Applied intelligence learns from previously allowed content to make future decisions more accurately and faster. Data discovery and classification tools allow you to protect known confidential or sensitive data files, thereby training the system on what to look for and subsequent remediation actions to be taken upon discovery of such data. TRANSPARENT REMEDIATION PROVIDES UNPARALLELED CONTROL VISIBILITY Instant-on remediation actions are instantly applied when policy violations are detected for transparent protection, control and visibility of information leaving your organization. Options include block, quarantine, allow, encrypt, blind copy, or reroute content. Seamless email encryption, easily added to your solution with a WatchGuard SecureMail Email Encryption subscription, allows you to securely transmit and receive private, sensitive, and regulated information without hindering the free flow of critical business communications. GRANULAR LOGGING AND REPORTING FOR AUDIT REQUIREMENTS Policy violation alerts and the remediation actions taken are triggered instantly for immediate visibility. Granular logs and one-click administration for customizable reports of policy violations are easily accessible to meet audit requirements.
  • 2. ADDRESS 505 Fifth Avenue South, Suite 500, Seattle, WA 98104 WEB www.watchguard.com U.S. SALES 1.800.734.9905 International Sales +1.206.613.0895 No express or implied warranties are provided for herein. All specifications are subject to change and expected future products, features or functionality will be provided on an if and when available basis. © 2012 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, Fireware, and LiveSecurity are either trademarks or registered trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other tradenames are the property of their respective owners. Part No. WGCE66739_102212 WatchGuard XCS Integrated Process for Data Loss Prevention Data Loss Prevention is integrated into all WatchGuard XCS models. It provides comprehensive, instant protection from information loss. The system uses an integrated process for inspection, discovery, and remediation of policy violations for outbound communications containing sensitive content. 1. Examine. Outbound communications are checked for private or sensitive data, including personal information and intellectual property. 2. Determine. The sophisticated XCS policy engine determines the appropriate action to take on a message, based on pre-defined policies. Policies are determined by the organization using customizable templates that aggregate internal policy with compliance-driven regulations Industry-specific compliance dictionaries, including dictionaries for PCI, HIPAA and GLB, help make policy generation fast and effective. 3. Take Action: Take the appropriate action on the message instantly, without the need for manual intervention. Depending on pre- defined policies, the message can be allowed, blocked, encrypted, copied to a compliance officer, stamped, returned to sender, and/or entered in the audit/log. 4. Report. It is important to be able to easily document the policies that have been implemented to enforce the regulations, as well as tracking actual message traffic to ensure compliance. XCS solutions provide granular logs for customizable reports of violations and remediation action taken to meet audit requirements. Extend Data Loss Prevention to Web Traffic The Web provides many exit points for sensitive information to leave your organization, including communications sent by popmail systems (hotmail, gmail, etc.), wikis, blogs, and social networks such as Facebook. Adding a Web Security subscription extends the data loss prevention capabilities of your XCS appliance* to include HTTP traffic, for comprehensive protection across protocols. Scans content in all outbound web traffic, including attachments, for policy violations. Inspects context in which communication is sent including who is sending the data, where it is being sent, and to whom. Uses the same policies developed for your organization’s email communications to save time and ensure strong and consistent enforcement. Allows administrator to manage data loss prevention across protocols from one easy-to-use administrative console. Provides consolidated visibility and control so you can meet stringent compliance requirements. * Web Security subscriptions are available for all XCS models. For more information on Data Loss Prevention capabilities and our complete line of powerful WatchGuard XCS solutions, visit www.watchguard.com/xcs. Examine Examine entire content including attachments Determine Determine if content and context is in accordance with defined policies Report Monitor and provide reports to demonstrate compliance and identify gaps Deliver content in accordance with defined policies - send, copy, encrypt, block X Privacy Compliance Engine Inspect - Filters Validate - Dictionaries Decide - Policies X Deliver Integrated Process for Privacy and Compliance Protection