Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Proofpoint Endpoint DLP

Protect against data loss at the endpoint

Proofpoint Endpoint Data Loss Prevention (DLP) takes a modern, people-centric approach to protecting your data. It provides you with integrate content awareness and behavioural and threat awareness. This gives you granular visibility into your users’ interactions with sensitive data. Detect, prevent and respond to data loss incidents in real time. Endpoint DLP builds on our proven leadership in email threat protection and insider threat management. All so you can reduce your data loss risk—without reducing your users’ productivity.

DETECT - Data loss detections and analytics

Detect risky data movement across and out of your environment with an out-of-the-box data loss rules engine. This allows you to identify sensitive data through scanning content in motion and reading data classification labels, such as from Microsoft Information Protection. You can also integrate our data-activity telemetry into your broader threat-hunting programs.

PREVENT - Data management and control

Prevent risky data movement from the endpoint, including transfers to and from USB devices and cloud sync folders. Endpoint DLP makes it easy to stop out-of-policy data usage and movement. You can concentrate prevention based on several factors. These include users, user groups, endpoint groups, application names, USB device ID/serial number, USB vendor, data classification label, scanned content match and source URL.

RESPOND - Data loss incident response

Our built-in incident-management workflows are tailored for endpoint data loss caused by users. All telemetry collected is visualised in timelines so you can always the answer ‘who, what, where, when and why’ behind each event and alert. These visual timelines also turn into evidence for deeper investigations with Insider Threat Management (ITM). And this allows you to collaborate easily with HR and Legal with evidence that is free of cybersecurity jargon.

ARCHITECTURE - Integration with Enterprise DLP and Insider Threat Management

Endpoint DLP runs on the cloud-native Information and Cloud Security platform. Its modern architecture is built for scale, analytics, security, privacy and extensibility. It shares a lightweight endpoint agent with Proofpoint Insider Threat Management. And that means you can extend your visibility and controls across data loss and insider risks without slowing down you users.

 

Rating
0 vote
Favoured:
0

Listing Details

Vendor
Proofpoint
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2022-07-10
Owner
kelsey.chalmers
Created
2022-07-06
  • 1251.jpg
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message