The second typical scenario is monitoring
Posted: Sat Feb 08, 2025 9:02 am
Further development of the logic of combining the capabilities of DeviceLock agents and the EtherSensor server leads us to scenarios that are more complex to implement, but at the same time much more effective in preventing leaks of confidential data.
First of all, this is a scenario that provides for separate control of network communications depending on the connection to the corporate network, when the degree of relevance of access to corporate information may vary depending on the current connection status (availability of the local network connection, availability of the domain controller, availability of the DLP server), and therefore a flexible approach to implementing information leak protection is required. Automatic switching of various combinations of DLP policies for network traffic control (various combinations of control rules and parameters) in the DeviceLock.
DLP agent depending on the presence of a connection to greece mobile database corporate network and/or corporate servers allows for extremely flexible, separate control of user network communications, when, for example, at the agent level, when the laptop is in the office, control of particularly critical network applications and services is maintained, including using content filtering in real time to prevent leakage of confidential information, and inspection of other network protocols and services is assigned to the EtherSensor module. When the DeviceLock agent on the protected workstation is switched to offline mode, the policies are automatically switched to the highest required level of control over network communications, taking into account the possible unavailability of outgoing network traffic from the workstation to the EtherSensor server.
First of all, this is a scenario that provides for separate control of network communications depending on the connection to the corporate network, when the degree of relevance of access to corporate information may vary depending on the current connection status (availability of the local network connection, availability of the domain controller, availability of the DLP server), and therefore a flexible approach to implementing information leak protection is required. Automatic switching of various combinations of DLP policies for network traffic control (various combinations of control rules and parameters) in the DeviceLock.
DLP agent depending on the presence of a connection to greece mobile database corporate network and/or corporate servers allows for extremely flexible, separate control of user network communications, when, for example, at the agent level, when the laptop is in the office, control of particularly critical network applications and services is maintained, including using content filtering in real time to prevent leakage of confidential information, and inspection of other network protocols and services is assigned to the EtherSensor module. When the DeviceLock agent on the protected workstation is switched to offline mode, the policies are automatically switched to the highest required level of control over network communications, taking into account the possible unavailability of outgoing network traffic from the workstation to the EtherSensor server.