This page is fully or partially automatically translated.

itsa 365: Header image action Safetica
  • Product Presentation
  • Technik I
  • Education and training
  • Cloud Security
  • Data security / DLP / Know-how protection
  • Endpoint Protection
  • Mobile Security

Do you ever have 1.6 million euros left for us?

Protecting sensitive data and meeting compliance requirements - these are the primary goals of Data Loss Prevention (DLP).

10/6/2020 4:00:00 PM – 10/6/2020 4:15:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

itsa 365: Header image action Safetica
  • Product Presentation
  • Technik I

Protecting sensitive data and meeting compliance requirements - these are the primary goals of Data Loss Prevention (DLP).

Language: German

Questions and Answers: Yes

graphical blue background
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

Protecting sensitive data and meeting compliance requirements - these are the primary goals of Data Loss Prevention (DLP). With the associated solution from Safetica, even small and medium-sized enterprises (SME) can afford this. And they should.

EVERY company has data that should or must not be allowed to leak out. From the complex patent to the payroll or the simple mail. Nowadays, business operations are always based on data, even if it is only supporting IT systems. If data is lost, the business stops. That can be expensive: On average, the cost of data loss and downtime per incident in 2019 was around 1.6 million euros, according to a study by Dell.

And it is not only profitability that suffers, but possibly also reputation. Don't think that your company in particular is immune to attack. Firstly, it can affect anyone and secondly, in four out of five cases, human error is the cause of data loss. The solution is simple: companies should use DLP software.

Safetica helps you meet compliance requirements and thus secure sensitive company data. An agent secures your endpoints and applies compliance requirements to prevent accidental (or deliberate) data loss. This agent ensures compliance even when you are offline. International and national standards/regulations can be easily met. This is what makes Safetica, which protects nearly 200,000 endpoints in over 110 countries worldwide, stand out:

- Protects any type of data, format or application
- Easy administration, fast implementation
- No additional hardware, existing IT infrastructure can be used
- Offline functionality
- Integration with Azure
- Inexpensive and therefore also suitable for SMEs

The right license for every requirement
Thanks to the clever licensing model, companies only pay for the function they really need. The architecture consists of an on-premise or cloud server including database, the Safetica Management Console and endpoints with Safetica clients. With the initial setup, the IT department creates a central database. Client activity is recorded and, depending on the license, activity can be evaluated down to user level; if a client goes offline, rules are still applied and DLP violations are recorded. As soon as a network connection is re-established, the client and the server are synchronized. The Safetica Management Console provides security risks as well as collected data and reports; in addition, security policies can be configured and applied to endpoints (PCs, laptops etc.) with Safetica client. The client enforces the security policies and documents file activities.

Safetica DLP protects data independent of format and application, on- and offline. This helps to prevent intentional or accidental data breaches and makes it easier to comply with data protection regulations. The software covers all standard channels and platforms through which data can leave a company: Email, removable storage & disk, file sharing and other Internet services, social networks, mobile devices and printing; all of which are possible:

- Ban/restriction of mobile devices and unauthorized media connections
- additional control options for mobile devices
- Overview of all data leaving the Office 365 cloud

IT staff can quickly create security policies with group-based or individual rules for each channel and apply them to different endpoints ("Allow", "Log Only", "Notify", "Deny") without any special knowledge. They can also enforce defined processes for particularly sensitive data.

read more

Speaker